Fuzzy controlFuzzy systemsSecurityAccess control policiesSecurity analysisRiskFuzzy logicRisk-adaptive access control
This work was undertaken during a project funded by the UK's Digital Catapult Researcher in Residency Fellowship programme
Grant Ref:EP/M029263/1
2022